Adding or editing an external event filter
- Open the External Event Filters page by navigating to Admin > Network Admin > External Events.
- Perform one of the following actions:
- To define a new external event filter, click Add.
- To view or change an existing external event filter, select the external event filter and click
.
For example, the event filter in the figure below is used to trigger the Auto Archive policy when a potential configuration change has been made by an external user.
- Enter or update the information in the following fields:
- Name: Specify a unique name for the filter.
- Enabled: (Optional) Uncheck to disable the filter.
- Source: Select Syslog or Check Point for the source of the external event.
Filter: (Optional) Specify one or more syslog text strings that, when matched, are categorized, logged and processed as the selected Event Type (for example, Configuration Changes) for the device.
The string should be in the form of a regular expression, with .* at the beginning and end when needed to match arbitrary text at the edges. See Grammar-field-metacharacters for a summary of regular expression metacharacters.
If the syslog message contains a username, enclose that part of the regular expression in parentheses (). TrueSight Network Automation extracts the username out of the message so that it can track external changes back to the originating user.- Event Type: Select an Event Type for this filter. The Event Type is used by the policy Keywords and defines how the event is logged in the Event Log.
- Incoming Severity: Select the syslog severity of the event for filter matching.
- Click Save to save your changes to the external event filter.
Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*